0% found this document useful (0 votes)
127 views

St. Rita of Cascia 2023 St. Paul University Philippines

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views

St. Rita of Cascia 2023 St. Paul University Philippines

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ST. PAUL UNIVERSITY ST.

RITA OF CASCIA 2023


PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

- the CPU controls, directs and supervises the entire computer


CONTENTS system
I. COMPUTER - the “heart” and the “brain” of the computer
A. Computer Hardware - it contains the electronic components essential for computer
1. Computer Functional Components operation
2. Classes of Computer
B. Computer Software
- Includes:
C. Data Processing -control unit
D. Computer system - Arithmetic logic unit
II. OPEN SOURCE - main memory unit
A. Free software
1. Copylefted
2. Non-copylefted Classes of Computer
B. Importance of Open Source  Analog computer
C. Common Fears, Uncertainties and Doubts (FUDs) Regarding OSS
III. DATA ASSESSMENT
-operates on continuous physical or electrical magnitudes
A. Two General Approaches To The Assessment Of Data  Digital computer
1. Direct -operates on discrete discontinuous numerical digits; represents
2. Indirect
data using discrete values for all data
B. Why do we need to assess
IV. PERSONAL, PROFESSIONAL AND EDUCATIONAL INFORMATICS  Hybrid computer
A. Personal Informatics - contains features of both the analogue and the digital computer
B. Medical and Nursing Informatics
C. Professional Informatics
D. Educational Informatics Hardware
1. Educational Informatics Research ● The silicon, metal, plastic portion of the hardware-
software human triangle
● ehealth- the use of info and communication technology
COMPUTER for health services and information by both healthcare
 An electronic information-processing machine that processes professionals and the public.
data under the direction of stored sequences of instructions ● 3 key synergistic advanced hardware elements enabling
(programs). mobile health (mhealth) are Physical device size, wireless
network access, and battery life.
Computer Hardware
 refers to a computer’s physical components ● Advances in computer hardware continue 2 trends: more
 the computer consists of many different component parts, powerful distributed across many machines mostly
including storage and peripheral devices that enable it to process common for cloud services and more powerful processing
data in every smaller packages
 peripheral devices (keyboard, mouse, printer, fax)
 storage devices (hard drive, floppy drives, tape drives) Technology in mobile healthcare
SSD (solid-state-drive) is a new generation of storage device ● Under the affordable care act, innovative technology is
that is faster than other storage devices and occupies larger seen as an integral component of an integrated accessible
space. outcome driven health care system.
● It may be the key to providing more effective preventive
Computer Functional Components
1. Input unit care, improving patient outcomes, improving access to
2. Central Processing Unit specialized medical services, and driving system wide cost
3. Secondary storage unit reduction.
4. Output unit ● The national institutes of health defines Mhealth as the
use of mobile and wireless devices to improve health
 Input unit outcomes, healthcare services and health research. Major
-“reception desk”
component: timely access to clinical information such as
-input devices” keyboard, display monitor, mouse, light pen, touch
screen the data contained in electronic health records or EHR,
- Medica devices: optical character recognition, magnetic-ink personal health records or PHR and patient portals.
character recognition, voice synthesizers, imaging, magnetic ● Nurses soon became familiar with the computers on
storage media, optical disk wheels or CO W, which evolved to work stations on
wheels or WOW
 Central Processing Unit
Major technology trends

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

1. Wireless patient monitoring- Technologies that enable supporting the OS or applications software
remote surveillance of patient vital functions through the programs.
use of internally and externally located patient devices
Categories of Utility Software:
examples are: wirelessly monitored pacemakers an 1. Security Software – protects the computer and its
automatic defibrillator‘s data from attacks that can destroy programs and
2. Mobile system access-Mobile technologies that enable data.
remote or virtual access to current clinical systems such as 2. Disk Management Utilities – designed to help the
electronic health records or EHR and picture archiving and user keep hard disk space clean and efficient.
3. Backup Utilities – serve to help the users back up
communication system or PA CS examples are: websites
their data.
portals and mobile apps 4. Screen Savers – computer programs that either
3. Medical devices blank the monitor screen or fill it with constantly
4. Mobile and or wireless enabled technologies that capture moving images when the user is away from the
and track key care compliance and disease management computer but does not turn it completely off.
data examples are digital glucometers blood pressure 5. Archival Software – compresses information in files
devices and pedometers to be archived, and then stores them in a compressed
form in some long-term storage device.
5. virtual consultation-Remote connectivity and multimedia
6. Programming Environment Support Programs –
solutions that enable virtual care consultation, education used by program developers to support their
and therapy examples are: Tallac consultations, mobile programming work or to run their programs.
video solutions 3. Applications Software
6. Aging in place-Remote technology is that enable clinically - Includes all the various programs people use to do
monitored independent living for aging populations work, process data, play games, communicate with
examples are: personal emergency response systems or others, and watch videos and multimedia programs
on a computer
PERS, video consultations, motion or activity monitoring,
- Application programs are written in a particular
fall detection, aggregation, transport programming language. Then the program is
“compiled/translated” into machine language so the
Computer Software computer can understand the instructions and
 tells what to the computer “what to do” execute the program.
 Includes all the intangible components that are not considered - By far, the most commonly used set of programs are
hardware the programs in the office package, such as Microsoft
 SOFTWARE refers to various types of computer programs Office, ApacheOpen Office, or LibreOffice, or any of
Major areas: the many other office suites.
 computer programs
 software packages Information Science
 programming languages - an interdisciplinary field primarily concerned with the
 computer programming analysis, collection, classification, manipulation, storage,
Purposes of Software retrieval, movement, dissemination, and use of
1. Translates instructions created in human language into information.
Machine language
2. Makes the computer an economic tool KEY THEMES IN INFORMATION SCIENCE:
 Optimality – refers to achieving an optimum value for
Categories of Software: some desired outcome.
1. System Software - May refer to almost any variable that is measured on
- Helps speed up the computer’s processing, expands a numerical scale, such as cost, time, workload, etc.
the power of the computer by creating cache  Performance – typically considered in the context of
memory, reduces the amount of confusion when average performance of the information system over a
multiple programs are running together, “cleans up” series of communication instances.
the hard drive so that the storage is managed  Complexity – reality with the enormous masses of data
efficiently, and performs other such system and information generated, collected, stored, and
management tasks. retrieved.
2. Utility Software  Structure – developing a system for ordering and
- Include programs designed to keep the computer cataloging the data and information, particularly in a
system operating efficiently – they do this by adding database.
power to the functioning of the system software or

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

Nursing information science + – been used for a variety of


- very concerned with measuring patient care outcomes applications, especially those that allow
and what nursing protocols produce the best outcomes. users to interact with electronic
companies through the Internet.
Programming language Java – developed by Sun Microsystems to
- a means of communicating with the computer. be a relatively simple language that would
- The only language a CPU can understand is binary or provide the portability across differing
machine language. computer platforms and the security
needed for use on a huge, public networks
GENERATIONS AND LEVELS OF PROGRAMMING LANGUAGES like the Internet.
3 LEVELS:
1. First Level – includes the first two generations of  Concurrent languages – designed for programs that
programming language: Machine Language and use multiple processors in parallel, rather than
Assembler Language running the program sequentially on a single
2. Second Level – includes the next two generations: high processor
level procedural and nonprocedural languages. Multiprocessing – involves multiple processors
3. Third level – includes natural language working in parallel.
Multithreading – accommodating multiple users
5 GENERATIONS: at the same time
1. First-Generation Languages
 Machine Language – the true language of the 4. Fourth-Generation Languages – specialized application
computer. programs that require more involvement of the user in
- Consists only of the binary numbers 1 and directing the program to do the necessary work.
0, representing the ON and OFF electrical SQL (Structured Query Language) – an
impulses. important Fourth-Generation language
o A language designed for management and
2. Second-Generation Languages query operations on a relational database.
 Assembler Language – far more like the English
language, but it is still very close to machine 5. Fifth-Generation Languages – or third-level languages
language. are called natural languages.
- In these type of programs, the user tells the
3. Third Generation machine what to do in the user’s own natural
 Procedural Languages – require the programmer to language or through use of a set of very English-
specify both what the computer is to do and the like commands.
procedure for how to do it. Biomedical Text Mining (BioNLP) – purpose is to
- Far more English-like than assembler and assist users to find information about a specific
machine languages. topic in biomedical literature.
Syntax – the style and sequence of a language DNorm – detects specific disease names in journal
MUMPS (Massachusetts General Hospital Utility articles or other text documents.
Multi-Programming System)
- third-generation language Data Processing
written specifically for use in
healthcare settings; now found What do computers do?
in many different industries Data processing
C – the most popular computer language for
writing new OSs and other system programs
- Was named after an earlier
prototype program called simply DATA PROCESS INFORMATION
B. (hardware +
software)

TWO IMPORTANT LATE 3RD GENERATION  changing of raw data into information as instructed by
LANGUAGES: computer programs
Visual Programming Languages  Data aggregates what we put and then processed to become
- Visual BASIC (Beginners’ All-purpose an information
Symbolic Instruction Code) and Visual C+

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

 We need both hardware and software to make an output • organized collection of related data. Placing notes in folders and
that is useful folders in file cabinets is one example of creating a paper
database; however, you can organize and store data in many
Data processing operations: different formats in a data- base. Healthcare professional may
• input store, inquire, update, retrieve, sort, transform, classify, store patient medical records in either paper or digital format but
compare, compute, summarize, report, output more and more healthcare organizations are converting to digital
Depends on the software we use, certain operations are utilized records. They can use each of these databases to store data and
Data to search for information. The possibility of finding information in
 raw facts that represent single pieces of information these databases depends on several factors.
 The smallest units for information that can be stored retrieved Types of Data
and or edited There are two primary approaches to classifying data in a
 Stored in the computer memory and secondary storage database system. First, they are classified in terms of how the
Data- naming, collecting and organizing users will use these data. This is the conceptual view of the data.
Information- organizing, interpreting Conceptual data classifications may include financial data, patient
Knowledge- interpreting, integrating and understanding data, or human resource data. Second, data are classified by their
Wisdom- understanding, applying integrating service with computerized data type. For example, data can be numbers or
passion letters or a combination of both. The designer uses this
classification to build the physical database within the computer
Common Database Operations system.
1. Data Input Operations. One uses data input operations to enter Conceptual Data. Conceptual data types how users view the
new data, update data in the system, or change data. The source of the data maybe basis of conceptual data
modify data in the DBMS. One usually enters data through a set of types.
screens that the designers have designed for data entry. A well- Computer-Based Data. Alphanumeric data include letters and
designed screen will discourage data entry errors. numbers in any combination; however
2. Data Processing Processes. Data processing process are DBMS- you cannot perform numeric calculations on the numbers in an
directed actions that the computer performs on entered data. The alphanumeric field
purpose is to extract information, discover new meanings, reorder Data base management (DBMS)
data and so forth. It is these processes that one uses to convert • allows input, storage, and access in a database
raw data into meaningful information. Database system design- process of configuring the database
3. Data Output Operation. Include online and written reports. software
Outputs can also include presentation of the processed data in DATA BASE MANAGEMENT SYSTEMS
charts and graphs for easier understanding. The approach to  A set of compute programs with a unique-high level
designing these reports will have a major impact on what programming language for manipulating the data in the database
information the reader actually gains from the report.  Designed to create, access, manage and monitor a database
Data structure and storage  Major command in a DBMS software:
 data are organized and stored in logical entities  Create, use, append, edit, modify, list, browse, go to, next,
These entities are arranged in a hierarchy consisting of: and delete
 bytes/ characters - fields/ data elements  Separates “admission”, “account” (related organizations) so
 records - files together they create one big information
 databases  The programmer usually creates that system while nurses assist

Advantages of Automated Database Management Systems


 decrease data redundancy
 increase data consistency
 improve access to all data
 datum is never repeated

Data Warehouse
- is a large collection of data imported from several different
systems into one database. The source of the data includes not
 Set of records are compressed into file only internal data from the institution but can also include data
 File constitutes databases from different related sources from external sources.
(hospitals, pharmacies, etc.)
Purpose: When users are viewing several different applications
there are several different versions of the truth. These can result
Data base from looking at the database at different times as well as the use of

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

different definitions. The user can slice and dice the data from - Can be found in SIAS where there are varieties of
different angles and at different levels of detail. information that can be seen such as personal
information, reports, statement of accounts, etc.
Functions:
•Bibliographical retrieval Systems
- must be able to extract data from the various computer systems
- Consists of document information and literature usually
and import those data into the data warehouse.
found in the library
- must function as a database able to store and process the data in
the database. This includes the ability to aggregate the data and EX. CARD CATALOG
process the aggregated data. •Stand-Alone, Dedicated or Turkey Systems
- must be able to deliver the data in the warehouse back to the - Found in ATM
users in the form of information. •Decision Support and Expert Systems
- Applied also in community talks
Computer System •Artificial Intelligence Systems
 The use of systems in a computer technology is based on systems • Natural Language Systems -can be found in voice commands
theory
Healthcare professionals use computer systems consisting of  HOSPITAL INFORMATION SYSTEM
multiple, interconnected computers that function to facilitate the  • AKA Medical Information System (MIS) or Patient Care
work of groups of providers and their support people in a system System (PCS)
called a network  • provides support for a wide variety of both administrative
Computer Networks: and clinical functions
 Point-to-point, • Purpose: manage information needed to facilitate daily hospital
very small network in which all parts of the system are operations by all healthcare personnel
directly connected via wires or wireless Components:
 Local area network (LAN), wide area network(WAN), and  electronic medical record for charting patient care,
metropolitan area network (MAN)  admission-discharge-transfer (ADT) systems
-it helps with patient tracking
SYSTEMS THEORY  medication administration record(MAR) software
 defines as several interrelated parts all working together to  supplies inventory systems
achieve desired fault  laboratory systems
 provides the conceptual basis for a computer system, which  computerized patient acuity system
consists of computer parts, all of which are working together to -used to help with nurse staff allocation
make the computer run.  hospital e-mail system for communication
 the basis for the use of computer system Dashboard
 Network theory- subset of system theory -an application for nurses’ application that provides a sort of a menu
- Provide the basis for understanding how the power of of
individual computers has been greatly enhanced through the options from which the nurse can choose
process of linking multiple computers into a single system - provide the nurse a quick way to order common output from
and multiple computer systems into networks certain screens
-alerts the nurses that a procedure is to be performed
SYSTEM TYPES Unfortunately, nursing systems are not found but nurses should be
 Mechanical knowledgeable of what they do in the health care setting
 Organizational
 Human
OPEN SOURCE
INFORMATION SYSTEM
•Information processing system/ data processing system Free Software
•Uses a computer software
 Freedom to run, copy, distribute, study, change and improve
• (hardware + software) to process data into information
the software.
•KEY PIECES:
 Freedom to run the program, for any purpose
-computer hardware
 Freedom to study how the program works, and adapt it to your
-computer software
needs
-database
INFORMATION SYSTEM TYPES  Freedom to redistribute copies so you can help others
• Management Information Systems (MIS)  Freedom to improve the program, and release your
improvements to the public
Access to the source code is needed to realise most of the above.

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

•Less dependence on software and technologies where we can have


Open-Source Software (OSS) no control/say
•Term "free" can lead to negative marketing connoctations
especially to business and corporate users. For Malaysia, open source provides unique opportunities to:
•[How can anything be good if it is free (i.e. has no monetary value •Local developers to learn and participate in systems software
to it)?] development
• Term open-source software was coined to refer to free software. •Build up a critical mass of good coders
•Produce localized versions of software
Other Categories of Software •Stimulate and build up the local software industry
•Freeware - Non-chargeable copyrighted software •Promote a research-based mind-set for both public and private
•Shareware - Software delivered without charge but continued sectors
usage subject to payment
•Proprietary Software - non-Free Software Common Fears, Uncertainties and Doubts (FUDs) Regarding OSS
•Public domain Software - non-copyrighted
No Accountability
Free/Open-Source Software Licensing FUD: Developed/maintained on best effort basis, volunteers, no
Free/Open-Source software licensing falls into 2 main types: single party fully accountable
•Copylefted Fact: Tightly knit developer community. Legally established non-
•Non-copylefted profit foundation or normal businesses supporting the software
Fact: Most close-source software licenses come with disclaimers -
Copylefted Software exempt the vendor from any liabilities arising from the use and
•Copyright a software and add in certain distribution restrictions to misuse of the software
prevent conversion into non-free. Open source has basically same level of accountability as close
•Anyone who redistributes the software, with or without changes, source!!
must pass along the freedom to further copy and change it.
•Guarantees that every user has freedom. No Support
FUD: No technical support
Non-copylefted Software Fact: Software author may not offer support but support available
•Much more permissive licensing than GPL from many sources:
•Permission to redistribute and modify •Local vendors
•Permission to add additional restrictions to its further distribution •User communities worldwide
and modification •Internet resources
•This means that it is possible for someone to take such software Fact: Commercial proprietary software users still mainly rely on
and make it proprietary with or without modifications. local vendor for support

Importance and Benefits of Open Source Not Secure


FUD: OSS insecure as source code is available
Freedom to learn, redistribute and enhance Fact: Unavailability of source code does not mean vulnerabilities
•Prevents single vendor and technology lock-in cannot be discovered - use modern debugging and software
•Promotion and preservation of open standards development tools
•Peer review and feedback will lead to: Fact: Source code availability facilitates:
O More robust and reliable software •Scrutiny by many people to flush out weaknesses in design and
O Better security and faster bug fixes code
•Promotes environment for positive competition, self-learning, •Independent check and 3rd party audit
exploring and co-operation
•Benefits poorer societies - affordable and accessible software Hidden backdoors
running on affordable computers and networks FUD: Possibility of hidden backdoors in OSS
Fact:
Benefits of Open Source to Developing Countries •Possible but not vulnerable if download software from well-
Promotes an environment which a society (like Malaysia), striving to known/trustworthy sites
become a technology-driven one, should have: •Ensure software security checksum corresponds with published
•Ability to "look under the hood" and learn value
•Conducive for technical and system development •Ability to examine source and re-compile
•Ability to learn, innovate and invent (LIVE) Fact:
•Encourages positive competition, self-help, and mutual co- •Commercial proprietary software known to ship infected with virus
operation and backdoor

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

•Backdoors possible in close source too and more difficult to detect Data set- are record and associated documentation
Data processing -is the changing of raw data into information as
Not User-friendly instructed by computer programs
FUD: UNIX-legacy - CLI, need to remember archaic commands
Fact: Possibly true in the past. In recent times GUI Windowing APPROACHES TO ORGANIZING DATA:
system very much the default interface. •sorting
Fact: User has a choice of using either GUI or CLI to run most of the •classifying
applications where applicable •summarizing
•calculating
Current State
Summary: FOUR FACTORS IN FINDING INFORMATION IN THE DATABASE:
•Deployment mainly on server side especially as Internet servers 1. How the data are named (indexed) and organized
•More and more corporations taking notice of OSS and asking 2. The size and complexity of the database
questions. 3. The type of data within the database
•Some OSS penetration in SMIs 4. The methodology or tools used to research the database
•In academia, usage high in IT, Computer Science and Engineering
Faculties Information
•Government considering OSS deployment in public sector - is a set of data which is processed in a meaningful way
seriously according to the given requirement.
•MOE may push for more OSS penetration in schools - is processed, structured, or presented in a given context to
•Not much development work in local OSS community make it meaningful and usefulInformation systems are used to
•Open source offers a viable alternative to proprietary software process data and produce information
•FUDs about open source unfounded - The systematic approach used to name, organize and store
•Adherence to open standards and open technologies allow users data in a database has a major impact on how easy it is to find
the freedom to choose the appropriate software - open source or information in the database.
proprietary
•Developing countries have numerous benefits if they use open Assessment- is the evaluation nor estimation of the nature, quality
source or ability of someone or something.
•Government and private sectors have prominent roles to play to
encourage open source usage and acceptance Data assessment is the process of evaluation on the completeness
and accuracy of data.
DATA ASSESSMENT •preliminary to analysis proper

Data Two General Approaches to the Assessment of Data


- is a raw unorganized fact that required to be processed to make it
meaningful A. Direct assessment
- can be simple at the same time unorganized unless it is organized • consists of evaluating the coverage and content of a data set.
- comprises facts, observations, perception numbers, characters, • Coverage refers to the faithfulness of the correspondence
symbols and image, it care raw uninterrupted facts that are without between the records that constitute the data set and the statistical
meaning. aggregate the data set represents.
- Example is a patient weigh recorded as 140lbs • Content refers to the completeness and accuracy of the
- when interpreted, information is produced information contained on the records in the data set. Direct
- the smallest unit of information that can be stored, retrieved, and assessment requires a record-matching study in which 2 data sets
or edited are compared
- stored in the computer memory and secondary storagedata may • The records in each data are divided into 2 groups: matched
be defined as systematic information about the members of some records, which represent entities represented by records in the
statistical aggregate. other data set and unmatched records, the remainder.
•Numbers of matched and unmatched records provide a basis for
Systematic means that the same information is available for every assessing coverage
entity with exceptions only for missing values and inapplicable cases •Comparison of corresponding values in matched records provides a
(age at first marriage for a never married woman) basis for assessing content.
• Direct assessment of data sets are expensive because a second
Statistical aggregate refers to a collection of entities (births, data set is required for comparison and because matching is often
persons, deaths, households) defined by explicitly stated rules for complex and difficult process
inclusion. •limited by response correlation bias

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

•by the tendency of data sets collected at the same time or nearly
the same time to have similar content error. PERSONAL, PROFESSIONAL AND EDUCATIONAL
INFORMATICS
B. Indirect assessment
• consists of assessing the data sets by analyzing the accuracy of Personal Informatics
statistics derived from them.  Was coined to refer such tools aimed at helping users collect and
• less expensive reflect in personal information
• give results as good or better than direct assessment.  Uses
• The principle means for assessing the accuracy of a statistic is - uses track finances
comparison with other statistics - document visited locations
•it may rely on a general knowledge rather than on specific - out of curiosity
comparison statistics - to receive awards on social networking sites
Ex: sex ratios at birth in national populations tend to be about 105
 Most users are interested in capturing and accessing data
male births per 100 female births. Should survey data indicate a
relevant to health, especially in an effort to change behaviour:
much higher value, it might be concluded that the completeness of
- to lose weight
reporting of female births was deficient. Such conclusions must
- quit smoking
always take due account of context, however a sex ratio at birth of
 - or improve sleep
130, for example might indicate sex selective abortion rather than
• or as part of self-managing chronic condition
defective data.
 is appearing that help people collect and reflect on personal
information
Data Quality Assessment (DQA)
 represents as an interesting area of study in human- computer
- is the process of scientificaslly and statistically evaluating data in
interaction
order to determine whether they meet the quality required for
projects or business processes and are of right and quantity to be  First, these systems help people better understand their
able to actually support their intended use. behavior. While many technologies inform people about the
-it can be considered a set of guidelines and techniques that are world, personal informatics systems inform people about
used to describe data, given an application context, and to apply themselves.
processes to asses and improve the quality of data.  Second, people participate in both the collection of behavioral
•the aim of a data quality assessment is to identify incorrect data, to information as well as the exploration and understanding of the
estimate the impact on the business processes, and to implement information. This poses demands on users that need to be
corrective action. explored
•helps to identify those records that have become inaccurate, the  Finally, we do not know all the problems that people may
potential impact that inaccuracy may have caused and the data’s experience with personal informatics systems. We know that
source. through this assessment, it can be recited and other people want to get information about themselves to reflect on,
potential issues identified and that systems that support this activity need to be effective
•use of computers in the execution of data quality analyses enables and simple to use.
us not only to investigate large quantities of data quickly , on the  Identifying problems that people experience in collecting and
basis of quality criteria but also to consult other (reliable) sources in making sense of personal information while using such systems is
an automated way, allowing us to determine the quality of our data critical for designing and developing effective personal
elements. informatics.
 personal informatics systems as those that help people collect
Why do we need to Assess? personally relevant information for the purpose of self-reflection
•Up-to-date, accurate information of each step of the Nursing and gaining self-knowledge
Process is the Power behind safe, high quality patient-centered  There are 2 core aspects to every personal informatics system:
care. collection and reflection
 effective personal informatics systems helps users collect the
NATIONAL NURSING DATA STANDARDS (NNDS) necessary personal information for insightful reflection
•The NNDS initiative supports the implementation of the Canadian  Personal informatics goes by other names such as “living by
Health Outcmes for Better Information and Care (C-HOBIC) numbers”, “qualifies self”, self-surveillance“, “self-tracking” and
•C-HOBIC is introducing structured, evidenced-based standardized “personal analytics”.
questions for admission and discharge assessments  Personal informatics system help people by facilitating collection
•The information that is collected all have a concept definition, a and storage of personal information and by providing a means of
valid and reliable measure and empirical evidence linking them to exploring and reflecting on the information.
nursing inputs or interventions  “informatics” is a subject to a range of definitions and usages, and
•This is important to people receiving care within the health-care in its broadest sense may be used simply as a synonym for
system. information technology

COURSE CODE:Topic Page 8


ST. PAUL UNIVERSITY ST. RITA OF CASCIA 2023
PHILIPPINES 1ST SEMESTER, A.Y. 2020-2021
SCHOOL OF NURSING

 Within computer science, it is commonly used to refer the topics  examines the issues and problems that arise from their
related to the representation, processing and communication of practice and how these relate to factors such as educational
information with computational systems and professional context, communication and information
 The concerns of computer science include non-semantic aspects practices, psychological and cognitive variables and ICT
of information, for example, the material characteristics and design and use
behavior of bit streams  Second, it seeks to contribute to the development of practical
 Domain specific areas include health informatics, chemo- knowledge that is relevant to diverse forms of ICT-supported
informatics, business informatics and social informatics learning.
 this includes knowledge about appropriate pedagogies.
 educational informatics research is concerned with the
Medical and Nursing Informatics relationships between people, information, ICTs, learning
 is used as an overarching term both to describe any informatics and professional practice at the level of individual and social
efforts related to health care and also to describe a distinct action, and in diverse organizational and institutional
specialty in the discipline of medicine. settings.
 Nursing informatics is the specialty that integrates nursing  It includes studies that focus on the cognitive and
science, computer science and information science in identifying, psychological aspects of the individual learners’ interactions
collecting, processing and managing data and information to with ICT- based information, as well studies that focus on
support nursing practice, administration, education, research and the impact of ICTs on learning interactions within groups or
expansion of nursing knowledge. communities, including the impact of using computer-
 Supports all nursing specialties, in all sites and setting whether at mediated communication (CMC) media
the basic or advanced level.
• Practice includes the development of application tools, processes Additional Notes/Reminders:
and structures that assist nurses with the management of data in
1. PPT notes are in BLACK
taking care of patients or in supporting their practice in nursing.
2. Lecture notes are in RED
3. Information retrieved in books are in BLUE
Professional Informatics
•Kling and Hara note that research in these areas tends to be
defined as the study of the application of ICTs and information
management (IM) techniques to the domain in question, References
although they suggest that definitions of informatics research PPT from Dr. Lorica, Essentials of Nursing Informatics by Virginia
that are solely “application-focused” fail to draw sufficient K. Saba and Kathleen A. McCormick
attention to the need to understand the human consequences of
these applications, and to what constitutes the appropriate
Transers
application of ICTs and IM in specific contexts.
Abad, Bunuan, Cabildo, Cabling, Poquiz
Educational Informatics
 educational informatics research is still an emergent domain,
given recent impetus by developments in the use of the Internet
as both an information environment and an environment for
learning.
 the domain is defined as: the study of the application of digital
technologies and techniques to the use and communication of
information in learning and education

Educational Informatics Research


•Overarching purpose is to develop and evaluate concepts, models,
theories, techniques, techniques and methodologies that are of
relevance to the use of ITCs for the purposes of learning, teaching
and supporting leaning in diverse settings.

Main Concerns :
 First, research in educational informatics seeks to understand the
effects on people using digital information resources, services,
systems. environments and communications media for learning
and education.

COURSE CODE:Topic Page 8

You might also like